Este conteúdo não está disponível no idioma selecionado.
Chapter 7. Configuring Single Sign-On for logging in to the RHEL web console service running on an IdM client and an IdM server
Using Single Sign-on (SSO) authentication provided by Identity Management (IdM) in the RHEL 9 web console has the following advantages:
- Users with a Kerberos ticket in the IdM domain do not need to provide login credentials to access the web console.
- Users with a certificate issued by the IdM certificate authority (CA) do not need to provide login credentials to access the web console. The web console server automatically switches to a certificate issued by the IdM certificate authority and accepted by browsers. Certificate configuration is not necessary.
- IdM domain administrators can use the RHEL 9 web console to manage the systems in the domain. With the proper permissions configured, IdM administrators can use their web console client, that is their browser, to run any command on any IdM host.
This chapter describes:
- How to configure SSO for logging in to the RHEL web console service running on an IdM client.
- How to configure SSO for logging in to the RHEL web console service running on an IdM server.
-
How to configure
sudo
access to IdM hosts for an IdM system administrator logged in to a web console client.
Prerequisites
The RHEL web console service is installed on a RHEL 9 system.
For details, see Installing the web console.
The IdM client is installed on the system where the RHEL web console service is running.
For details, see IdM client installation.
7.1. Joining a RHEL 9 system to an IdM domain using the web console
You can use the web console to join a Red Hat Enterprise Linux 9 system to the Identity Management (IdM) domain.
Prerequisites
- The IdM domain is running and reachable from the client you want to join.
- You have the IdM domain administrator credentials.
You have installed the RHEL 9 web console.
For instructions, see Installing and enabling the web console.
Procedure
Log in to the RHEL 9 web console.
For details, see Logging in to the web console.
- In the Configuration field of the Overview tab click Join Domain.
- In the Join a Domain dialog box, enter the host name of the IdM server in the Domain Address field.
- In the Domain administrator name field, enter the user name of the IdM administration account.
- In the Domain administrator password, add a password.
- Click .
Verification
- If the RHEL 9 web console did not display an error, the system has been joined to the IdM domain and you can see the domain name in the System screen.
To verify that the user is a member of the domain, click the Terminal page and type the
id
command:Copy to Clipboard Copied! Toggle word wrap Toggle overflow id
$ id euid=548800004(example_user) gid=548800004(example_user) groups=548800004(example_user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
7.2. Logging in to the web console using Kerberos authentication
As an Identity Management (IdM) user, you can use Single Sign-On (SSO) authentication to automatically access the RHEL web console in your browser.
With SSO, you usually do not have any administrative privileges in the web console. This only works if you configure passwordless sudo. The web console does not interactively ask for a sudo password.
Prerequisites
The IdM domain is resolvable by DNS. For instance, the SRV records of the Kerberos server are resolvable:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow host -t SRV _kerberos._udp.idm.example.com
$ host -t SRV _kerberos._udp.idm.example.com _kerberos._udp.idm.example.com has SRV record 0 100 88 dc.idm.example.com
If the system where you are running your browser is a RHEL 9 system and has been joined to the IdM domain, you are using the same DNS as the web console server and no DNS configuration is necessary.
- You have configured the web console server for SSO authentication.
- The host on which the web console service is running is an IdM client.
- You have configured the web console client for SSO authentication.
Procedure
Obtain your Kerberos ticket-granting ticket:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow kinit idmuser@IDM.EXAMPLE.COM
$ kinit idmuser@IDM.EXAMPLE.COM Password for idmuser@IDM.EXAMPLE.COM:
Enter the fully qualified name of the host on which the web console service is running into your browser:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow https://<dns_name>:9090
https://<dns_name>:9090
At this point, you are successfully connected to the RHEL web console and you can start with configuration. For example, you can join a RHEL 9 system to the IdM domain in the web console.
7.3. Enabling the RHEL web console Single Sign-on with GSSAPI on IdM servers
The RHEL web console can use the Generic Security Services Application Program Interface (GSSAPI) authentication. However, the IdM framework already owns an HTTP/server.idm.example.com@IDM.EXAMPLE.COM Kerberos service and its keytab. Therefore, to implement GSSAPI authentication on Identity Management (IdM) servers, create a symlink /etc/cockpit/krb5.keytab
to /var/lib/ipa/gssproxy/http.keytab
and then generate a certificate-key pair.
Prerequisites
-
You have
root
privileges. - You are using RHEL 9.6 or later.
Procedure
Create a symlink:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow ln -s /var/lib/ipa/gssproxy/http.keytab /etc/cockpit/krb5.keytab
# ln -s /var/lib/ipa/gssproxy/http.keytab /etc/cockpit/krb5.keytab
Set a certificate file Bash variable:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow CERT_FILE=/etc/cockpit/ws-certs.d/50-certmonger.crt
# CERT_FILE=/etc/cockpit/ws-certs.d/50-certmonger.crt
Set a certificate key Bash variable:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow KEY_FILE=/etc/cockpit/ws-certs.d/50-certmonger.key
# KEY_FILE=/etc/cockpit/ws-certs.d/50-certmonger.key
Generate a certificate-key pair:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow ipa-getcert request -f ${CERT_FILE} -k ${KEY_FILE} -D $(hostname --fqdn)
# ipa-getcert request -f ${CERT_FILE} -k ${KEY_FILE} -D $(hostname --fqdn)
Additional resources
7.4. Enabling sudo access for IdM administrators on IdM hosts
You can configure Identity Management (IdM) system administrators to have sudo
privileges on an IdM host.
Prerequisites
- You are logged in as an IdM administrator to an IdM host.
-
You have
root
privileges on the host.
Procedure
Enable
sudo
access on the host:Copy to Clipboard Copied! Toggle word wrap Toggle overflow ipa-advise enable-admins-sudo | sh -ex
# ipa-advise enable-admins-sudo | sh -ex